Resultado da Pesquisa - cry

TrustPort Total Protection 2011 11.0.0.4608

TrustPort Total Protection 2011 11.0.0.4608  5163 

TrustPort Total Protection 2011 protects the computer from viruses and spyware at all entry points. All electronic mail and websites…

Cryptainer USB Encryption Software 14.2.5.0

Cryptainer USB Encryption Software 14.2.5.0  4992 

Cryptainer USB Encryption Software allows to create a 'stand-alone' or a 'portable' install on External Drive such as USB Flash…

KISSKey Keylogger 3.4.4.167

KISSKey Keylogger 3.4.4.167 versão gratuita 4394 

If you appreciate the KISS principle (Keep It Simple, Stupid), then you’ll appreciate KISSKey, a keylogger focused on simplicity. Capture…

CyberGhost VPN Basic 7.3.14.5857

CyberGhost VPN Basic 7.3.14.5857  4967 

CyberGhost client software connects you with an online server via a so-called tunnel that transmits all data in encrypted form,…

Free Keylogger 5.3

Free Keylogger 5.3 versão gratuita 4740 

This is a comprehensive monitoring software. Free Keylogger allows you to record nearly all user activities on computer invisibly. It…

Silent Keylogger 1.40

Silent Keylogger 1.40  5187 

Silent Keylogger invisibly records every user activity performed on the computer in AES encrypted log files and sends to your…

KISSKey Keylogger 3.0.0.0

KISSKey Keylogger 3.0.0.0  4570 

If you appreciate the KISS principle (Keep It Simple, Stupid), then you'll appreciate KISSKey Keylogger, a keylogger focused on simplicity.…

USB Lockit 2.6

USB Lockit 2.6 versão gratuita 4976 

USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from…

S.S.E. File Encryptor for PC 14.6.1

S.S.E. File Encryptor for PC 14.6.1 versão gratuita 4855 

Securely encrypt your private and confidential files or whole folders. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit,…

GiliSoft Privacy Protector 11.0.3

GiliSoft Privacy Protector 11.0.3  4554 

GiliSoft Privacy Protector effectively prevents most illegal operations performed by hackers or malicious software such as viruses, trojans and spyware,…

« First « Prev 1 2 ... 10 11 12 ... 77 78 Next » Last »